Resources

Privacy Tech Proton VPN VPN Comparison Chart – If you like to do a little research on your different options. Please see the caveats in the chart. Surveillance Self-Defense – Tips, Tools and How-tos for Safer Online Communications, A Project of the...

How to Talk to Your Family About Safe Socials

Social media is a part of kids’ lives from a young age. The younger generations are raised with a social media presence, sharing videos, creating content, making friends in online spaces. It’s where they find connection with friends, share experiences, learn and...

Spot Patterns: Baseline Behaviors and Red Flags

What is a behavioral baseline? There are several descriptions for what constitutes a baseline level of behavior, however, the accepted understanding is the frequency, duration or intensity of a behavior. Alternatively, Psychology Dictionary describes behavioral...

How to Spot Romance Scams

What we’ll cover: Romance scams by the numbers Who scammers target Why they do it Rise of Sextortion How to spot the scammer What to do next Romance Scams by the Numbers In 2022, monetary losses to romance scams is estimated to be US $1.3 billion. This is based on...

5 Tips & Tools to Protect Your Privacy in 2024

In the last blog, we talked about data breaches, passwords & your privacy settings. This week we’re going to dig into the next steps you can take to protect your data in 2024. By taking a holistic view of your overall digital footprint, you can make the decisions...

Privacy Tips & Tools to Help Take Control of Your Data

Frequently, people ask why privacy matters, and then you must explain to them in a non-dry fashion why they should care what companies are doing with their data. Let’s start with a story that will help you understand. You have a health condition, which is protected...

Protecting Privacy & Profits with Safe Payment Methods

Online shopping scams are one of the most prevalent forms of consumer fraud, especially social media scams. While online shopping scams are the most reported, scams using social media to promote investment opportunities are also prevalent. The Federal Trade Commission...

Simple Steps to Secure Your Mobile Devices

First let’s define Mobile Security for our purposes, and why it matters to you. The term mobile security means to safeguard personal and business information stored on or transmitted on mobile devices. Mobile security can include the following: Physical security:...

The Internet of Things: A Quick Guide to IoT Basics & Privacy

Internet of Things In the fast-paced world of technology, the Internet of Things (IoT) stands out as a transformative force that has changed the way people manage their home & businesses. Understanding the basics of IoT is crucial, as it presents both...

Hackable Holidays: The Best Security Gifts for the Season

As the holiday season rapidly approaches, let’s think about more than festive decorations and gift exchanges, but also consider the security and privacy for our lives and businesses. This is the perfect time of year to invest in a few small items that will help you...

Hackable Holidays: 5 Scams to Watch Out For

Key Takeaways Some of the most common ways scammers target you during the holidays: Social media ads that look like online stores Package theft off your porch Fake delivery notification texts & emails Fraudulent charities that steal your hard-earned money Gift...
Subscribe To the Security Round-Up

Subscribe To the Security Round-Up

Get the latest privacy & security tech highlights, straight to your inbox! Plus a little snark with it. :)

You have Successfully Subscribed!